238 CVEs tracked today. 9 Critical, 69 High, 141 Medium, 8 Low.
-
CVE-2025-54883
CRITICAL
CVSS 9.3
Vision UI is a collection of enterprise-grade, dependency-free modules for modern web projects. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
-
CVE-2025-6994
CRITICAL
CVSS 9.8
The Reveal Listing plugin by smartdatasoft for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.3. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Privilege Escalation
PHP
-
CVE-2025-54594
CRITICAL
CVSS 9.1
react-native-bottom-tabs is a library of Native Bottom Tabs for React Native. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
RCE
Code Injection
Node.js
-
CVE-2025-30127
CRITICAL
CVSS 9.8
An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-23317
CRITICAL
CVSS 9.1
NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Nvidia
Buffer Overflow
RCE
Heap Overflow
Denial Of Service
-
CVE-2025-23311
CRITICAL
CVSS 9.8
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Stack Overflow
Nvidia
Buffer Overflow
RCE
Denial Of Service
-
CVE-2025-23310
CRITICAL
CVSS 9.8
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer overflow by specially crafted inputs. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Stack Overflow
Nvidia
Buffer Overflow
RCE
Microsoft
-
CVE-2025-22470
CRITICAL
CVSS 9.3
CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the firmware versions prior to 1.15.5-r1 allow crafted dangerous files to be uploaded. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
File Upload
-
CVE-2025-7768
CRITICAL
CVSS 9.3
Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-54884
HIGH
CVSS 8.7
Vision UI is a collection of enterprise-grade, dependency-free modules for modern web projects. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-54872
HIGH
CVSS 8.7
onion-site-template is a complete, scalable tor hidden service self-hosting sample. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-54801
HIGH
CVSS 8.7
Fiber is an Express inspired web framework written in Go. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Denial Of Service
Fiber
Suse
-
CVE-2025-54655
HIGH
CVSS 8.1
Race condition vulnerability in the virtualization base module. Rated high severity (CVSS 8.1), this vulnerability is no authentication required. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54653
HIGH
CVSS 8.4
Path traversal vulnerability in the virtualization file module. Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available.
Path Traversal
Harmonyos
-
CVE-2025-54652
HIGH
CVSS 8.4
Path traversal vulnerability in the virtualization base module. Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available.
Path Traversal
Harmonyos
-
CVE-2025-54634
HIGH
CVSS 8.0
Vulnerability of improper processing of abnormal conditions in huge page separation. Rated high severity (CVSS 8.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54627
HIGH
CVSS 8.8
Out-of-bounds write vulnerability in the skia module. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Harmonyos
-
CVE-2025-54622
HIGH
CVSS 8.3
Binding authentication bypass vulnerability in the devicemanager module. Rated high severity (CVSS 8.3), this vulnerability is no authentication required. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-54611
HIGH
CVSS 7.3
EXTRA_REFERRER resource read vulnerability in the Gallery module. Rated high severity (CVSS 7.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54607
HIGH
CVSS 7.7
Authentication management vulnerability in the ArkWeb module. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54606
HIGH
CVSS 7.3
Status verification vulnerability in the lock screen module. Rated high severity (CVSS 7.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54125
HIGH
CVSS 8.7
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Information Disclosure
Xwiki
-
CVE-2025-54124
HIGH
CVSS 7.1
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.
Information Disclosure
Xwiki
-
CVE-2025-53786
HIGH
CVSS 8.0
On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable. No vendor patch available.
Authentication Bypass
Microsoft
Exchange Server
-
CVE-2025-51624
HIGH
CVSS 7.6
Cross-site scripting (XSS) vulnerability in Zone Bitaqati thru 3.4.0. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-51532
HIGH
CVSS 7.5
Incorrect access control in Sage DPW 2024_12_004 and earlier allows unauthorized attackers to access the built-in Database Monitor via a crafted request. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Sage Dpw
-
CVE-2025-51056
HIGH
CVSS 8.2
An unrestricted file upload vulnerability in Vedo Suite version 2024.17 allows remote authenticated attackers to write to arbitrary filesystem paths by exploiting the insecure 'uploadPreviews()'. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
RCE
File Upload
Vedo Suite
-
CVE-2025-51055
HIGH
CVSS 8.6
Insecure Data Storage of credentials has been found in /api_vedo/configuration/config.yml file in Vedo Suite version 2024.17. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Information Disclosure
Vedo Suite
-
CVE-2025-51040
HIGH
CVSS 7.5
Electrolink FM/DAB/TV Transmitter Web Management System Unauthorized access vulnerability via the /FrameSetCore.html endpoint in Electrolink 500W, 1kW, 2kW Medium DAB Transmitter Web v01.09, v01.08,. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Information Disclosure
Fm Dab Tv Transmitter Web Management System
-
CVE-2025-50286
HIGH
CVSS 8.1
A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.
PHP
File Upload
RCE
Grav
-
CVE-2025-47908
HIGH
CVSS 7.5
Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Redhat
Suse
-
CVE-2025-47324
HIGH
CVSS 7.5
Information disclosure while accessing and modifying the PIB file of a remote device via powerline. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Qca7005 Firmware
-
CVE-2025-46659
HIGH
CVSS 7.5
An issue was discovered in ExonautWeb in 4C Strategies Exonaut 21.6. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Exonaut
-
CVE-2025-46390
HIGH
CVSS 7.5
CWE-204: Observable Response Discrepancy. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-46387
HIGH
CVSS 8.8
CWE-639 Authorization Bypass Through User-Controlled Key. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-46386
HIGH
CVSS 8.8
CWE-639 Authorization Bypass Through User-Controlled Key. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-45766
HIGH
CVSS 7.0
poco v1.14.1-release was discovered to contain weak encryption. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.
Information Disclosure
Poco
Suse
-
CVE-2025-38747
HIGH
CVSS 7.8
Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Dell
Information Disclosure
Supportassist Os Recovery
-
CVE-2025-27076
HIGH
CVSS 7.8
Memory corruption while processing simultaneous requests via escape path. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2025-27075
HIGH
CVSS 7.8
Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2025-27073
HIGH
CVSS 7.5
Transient DOS while creating NDP instance. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Immersive Home 214 Platform Firmware
Immersive Home 216 Platform Firmware
Immersive Home 316 Platform Firmware
Immersive Home 318 Platform Firmware
-
CVE-2025-27071
HIGH
CVSS 7.3
Memory corruption while processing specific files in Powerline Communication Firmware. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Qca6391 Firmware
-
CVE-2025-27069
HIGH
CVSS 7.8
Memory corruption while processing DDI command calls. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sc8380xp Firmware
Wcd9380 Firmware
-
CVE-2025-27068
HIGH
CVSS 7.8
Memory corruption while processing an IOCTL command with an arbitrary address. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6200 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sc8380xp Firmware
-
CVE-2025-27067
HIGH
CVSS 7.8
Memory corruption while processing DDI call with invalid buffer. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Wsa8840 Firmware
Wsa8845 Firmware
Wsa8845h Firmware
Fastconnect 6900 Firmware
-
CVE-2025-27066
HIGH
CVSS 7.5
Transient DOS while processing an ANQP message. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
315 5g Iot Modem Firmware
Aqt1000 Firmware
Ar8031 Firmware
Ar8035 Firmware
-
CVE-2025-27065
HIGH
CVSS 7.5
Transient DOS while processing a frame with malformed shared-key descriptor. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Ar8035 Firmware
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2025-27062
HIGH
CVSS 7.8
Memory corruption while handling client exceptions, allowing unauthorized channel access. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Buffer Overflow
315 5g Iot Modem Firmware
Apq8064au Firmware
Ar8035 Firmware
-
CVE-2025-23331
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a memory allocation with excessive size value, leading to a segmentation fault, by providing an. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Triton Inference Server
Windows
-
CVE-2025-23327
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through specially crafted inputs. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Integer Overflow
Triton Inference Server
-
CVE-2025-23326
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through a specially crafted input. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Triton Inference Server
Windows
-
CVE-2025-23325
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause uncontrolled recursion through a specially crafted input. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Triton Inference Server
Windows
-
CVE-2025-23324
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault, by providing an invalid. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Integer Overflow
Triton Inference Server
-
CVE-2025-23323
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault, by providing an invalid. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Integer Overflow
Triton Inference Server
-
CVE-2025-23322
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where multiple requests could cause a double free when a stream is cancelled before it is processed. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Triton Inference Server
Windows
-
CVE-2025-23321
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero issue by issuing an invalid request. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Triton Inference Server
Windows
-
CVE-2025-23320
HIGH
CVSS 7.5
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Nvidia
Microsoft
Python
Information Disclosure
Triton Inference Server
-
CVE-2025-23319
HIGH
CVSS 8.1
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write by sending a request. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Denial Of Service
Nvidia
RCE
Buffer Overflow
Microsoft
-
CVE-2025-23318
HIGH
CVSS 8.1
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Denial Of Service
Nvidia
RCE
Buffer Overflow
Microsoft
-
CVE-2025-21477
HIGH
CVSS 7.5
Transient DOS while processing CCCH data when NW sends data with invalid length. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
315 5g Iot Modem Firmware
Ar8035 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2025-21474
HIGH
CVSS 7.8
Memory corruption while processing commands from A2dp sink command queue. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Use After Free
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
-
CVE-2025-21473
HIGH
CVSS 7.8
Memory corruption when using Virtual cdm (Camera Data Mover) to write registers. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Snapdragon 8 Gen 1 Mobile Platform Firmware
Wcd9380 Firmware
-
CVE-2025-21461
HIGH
CVSS 7.8
Memory corruption when programming registers through virtual CDM. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sm6650 Firmware
-
CVE-2025-21458
HIGH
CVSS 7.8
Memory corruption when IOCTL interface is called to map and unmap buffers simultaneously. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Memory Corruption
Buffer Overflow
Use After Free
Fastconnect 6900 Firmware
Qam8255p Firmware
-
CVE-2025-21456
HIGH
CVSS 7.8
Memory corruption while processing IOCTL command when multiple threads are called to map/unmap buffer concurrently. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Use After Free
Ar8035 Firmware
C V2x 9150 Firmware
-
CVE-2025-21455
HIGH
CVSS 7.8
Memory corruption while submitting blob data to kernel space though IOCTL. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Qca6391 Firmware
-
CVE-2025-21452
HIGH
CVSS 7.5
Transient DOS while processing a random-access response (RAR) with an invalid PDU length on LTE network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
315 5g Iot Modem Firmware
Ar8035 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2025-8654
HIGH
CVSS 8.8
Kenwood DMX958XR ReadMVGImage Command Injection Remote Code Execution Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8653
HIGH
CVSS 8.8
Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stack Overflow
RCE
Dmx958Xr Firmware
-
CVE-2025-8420
HIGH
CVSS 8.1
The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
WordPress
RCE
Code Injection
-
CVE-2025-7771
HIGH
CVSS 8.7
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. Rated high severity (CVSS 8.7). No vendor patch available.
RCE
Microsoft
Privilege Escalation
Windows
-
CVE-2025-7770
HIGH
CVSS 8.7
Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-7769
HIGH
CVSS 8.7
Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allowing remote code execution due to improper. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Command Injection
RCE
Information Disclosure
-
CVE-2025-7036
HIGH
CVSS 7.5
The CleverReach® WP plugin for WordPress is vulnerable to time-based SQL Injection via the ‘title’ parameter in all versions up to, and including, 1.5.20 due to insufficient escaping on the user. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
SQLi
-
CVE-2025-6634
HIGH
CVSS 7.8
A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
RCE
3ds Max
-
CVE-2025-6633
HIGH
CVSS 7.8
A maliciously crafted RBG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
3ds Max
-
CVE-2025-3354
HIGH
CVSS 8.1
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Heap Overflow
Buffer Overflow
IBM
RCE
Tivoli Monitoring
-
CVE-2025-3320
HIGH
CVSS 8.1
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Heap Overflow
Buffer Overflow
IBM
RCE
Tivoli Monitoring
-
CVE-2025-54879
MEDIUM
CVSS 5.3
Mastodon is a free, open-source social network server based on ActivityPub Mastodon which facilitates LDAP configuration for authentication. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Allocation of Resources Without Limits vulnerability could allow attackers to exhaust system resources through uncontrolled allocation.
Denial Of Service
Mastodon
-
CVE-2025-54876
MEDIUM
CVSS 6.9
The Janssen Project is an open-source identity and access management (IAM) platform. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-54869
MEDIUM
CVSS 6.0
FPDI is a collection of PHP classes that facilitate reading pages from existing PDF documents and using them as templates in FPDF. Rated medium severity (CVSS 6.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Denial Of Service
PHP
-
CVE-2025-54651
MEDIUM
CVSS 4.8
Race condition vulnerability in the kernel hufs module. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Race Condition
Harmonyos
-
CVE-2025-54650
MEDIUM
CVSS 4.2
Improper array index verification vulnerability in the audio codec module. Rated medium severity (CVSS 4.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54649
MEDIUM
CVSS 4.5
Vulnerability of using incompatible types to access resources in the location service. Rated medium severity (CVSS 4.5). No vendor patch available.
Memory Corruption
Information Disclosure
Harmonyos
-
CVE-2025-54648
MEDIUM
CVSS 5.4
Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Harmonyos
-
CVE-2025-54647
MEDIUM
CVSS 5.4
Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Harmonyos
-
CVE-2025-54646
MEDIUM
CVSS 5.1
Vulnerability of inadequate packet length check in the BLE module. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54645
MEDIUM
CVSS 5.0
Out-of-bounds array access issue due to insufficient data verification in the location service module. Rated medium severity (CVSS 5.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2025-54644
MEDIUM
CVSS 6.6
Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54643
MEDIUM
CVSS 6.6
Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54642
MEDIUM
CVSS 6.7
Issue of buffer overflow caused by insufficient data verification in the kernel gyroscope module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Emui
Harmonyos
-
CVE-2025-54641
MEDIUM
CVSS 6.7
Issue of buffer overflow caused by insufficient data verification in the kernel acceleration module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Emui
Harmonyos
-
CVE-2025-54640
MEDIUM
CVSS 5.5
ParcelMismatch vulnerability in attribute deserialization. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Deserialization
Harmonyos
-
CVE-2025-54639
MEDIUM
CVSS 5.5
ParcelMismatch vulnerability in attribute deserialization. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Deserialization
Harmonyos
-
CVE-2025-54638
MEDIUM
CVSS 5.5
Issue of inconsistent read/write serialization in the ad module. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Deserialization
Harmonyos
-
CVE-2025-54637
MEDIUM
CVSS 4.4
Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54636
MEDIUM
CVSS 4.4
Issue of buffer overflow caused by insufficient data verification in the kernel drop detection module. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Emui
Harmonyos
-
CVE-2025-54635
MEDIUM
CVSS 5.9
Vulnerability of returning released pointers in the distributed notification service. Rated medium severity (CVSS 5.9), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Use After Free
Information Disclosure
Harmonyos
-
CVE-2025-54633
MEDIUM
CVSS 6.7
Out-of-bounds read vulnerability in the register configuration of the DMA module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Harmonyos
-
CVE-2025-54632
MEDIUM
CVSS 6.8
Vulnerability of insufficient data length verification in the HVB module. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Emui
Harmonyos
-
CVE-2025-54631
MEDIUM
CVSS 6.7
Vulnerability of insufficient data length verification in the partition module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Integer Overflow
Harmonyos
-
CVE-2025-54630
MEDIUM
CVSS 6.8
:Vulnerability of insufficient data length verification in the DFA module. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Heap Overflow
Buffer Overflow
Harmonyos
-
CVE-2025-54629
MEDIUM
CVSS 6.7
Race condition issue occurring in the physical page import process of the memory management module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Race Condition
Emui
Harmonyos
-
CVE-2025-54628
MEDIUM
CVSS 5.3
Vulnerability of incomplete verification information in the communication module. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Emui
Harmonyos
-
CVE-2025-54626
MEDIUM
CVSS 4.4
Pointer dangling vulnerability in the cjwindow module. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Use After Free
Information Disclosure
Harmonyos
-
CVE-2025-54625
MEDIUM
CVSS 6.7
Race condition vulnerability in the kernel file system module. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54624
MEDIUM
CVSS 5.7
Unexpected injection event vulnerability in the multimodalinput module. Rated medium severity (CVSS 5.7), this vulnerability is low attack complexity. No vendor patch available.
Code Injection
Harmonyos
-
CVE-2025-54623
MEDIUM
CVSS 6.3
Out-of-bounds read vulnerability in the devicemanager module. Rated medium severity (CVSS 6.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2025-54621
MEDIUM
CVSS 5.3
Iterator failure issue in the WantAgent module. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54620
MEDIUM
CVSS 5.5
Deserialization vulnerability of untrusted data in the ability module. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Deserialization
Harmonyos
-
CVE-2025-54619
MEDIUM
CVSS 5.3
Iterator failure issue in the multi-mode input module. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54618
MEDIUM
CVSS 5.7
Permission control vulnerability in the distributed clipboard module. Rated medium severity (CVSS 5.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54617
MEDIUM
CVSS 6.8
Stack-based buffer overflow vulnerability in the dms_fwk module. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Stack Overflow
Harmonyos
-
CVE-2025-54616
MEDIUM
CVSS 4.0
Out-of-bounds array access vulnerability in the ArkUI framework. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Harmonyos
-
CVE-2025-54615
MEDIUM
CVSS 6.2
Vulnerability of insufficient information protection in the media library module. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54614
MEDIUM
CVSS 6.2
Input verification vulnerability in the home screen module. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54613
MEDIUM
CVSS 5.9
Iterator failure vulnerability in the card management module. Rated medium severity (CVSS 5.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54612
MEDIUM
CVSS 5.9
Iterator failure vulnerability in the card management module. Rated medium severity (CVSS 5.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2025-54610
MEDIUM
CVSS 5.4
Out-of-bounds access vulnerability in the audio codec module. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2025-54609
MEDIUM
CVSS 5.4
Out-of-bounds access vulnerability in the audio codec module. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Harmonyos
-
CVE-2025-54608
MEDIUM
CVSS 6.2
Vulnerability that allows setting screen rotation direction without permission verification in the screen management module. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Privilege Escalation
Harmonyos
-
CVE-2025-54571
MEDIUM
CVSS 6.9
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Nginx
Apache
XSS
Modsecurity
Redhat
-
CVE-2025-51531
MEDIUM
CVSS 6.1
A reflected cross-site scripting (XSS) vulnerability in Sage DPW 2024_12_004 and earlier allows attackers to execute arbitrary JavaScript in the context of a victim's browser via injecting a crafted. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Sage Dpw
-
CVE-2025-51308
MEDIUM
CVSS 5.3
In Gatling Enterprise versions below 1.25.0, a low-privileged user that does not hold the role "admin" could perform a REST API call on read-only endpoints, allowing him to collect some information,. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Gatling
-
CVE-2025-51306
MEDIUM
CVSS 6.5
In Gatling Enterprise versions below 1.25.0, a user logging-out can still use his session token to continue using the application without expiration, due to incorrect session management. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Information Disclosure
Gatling
-
CVE-2025-51058
MEDIUM
CVSS 6.5
Bottinelli Informatical Vedo Suite 2024.17 is vulnerable to Server-side Request Forgery (SSRF) in the /api_vedo/video/preview endpoint, which allows remote authenticated attackers to trigger HTTP. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SSRF
Vedo Suite
-
CVE-2025-51057
MEDIUM
CVSS 6.5
A local file inclusion (LFI) vulnerability in Vedo Suite version 2024.17 allows remote authenticated attackers to read arbitrary filesystem files by exploiting an unsanitized 'readfile()' function. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Lfi
PHP
Information Disclosure
Vedo Suite
-
CVE-2025-51054
MEDIUM
CVSS 6.5
Vedo Suite 2024.17 is vulnerable to Incorrect Access Control, which allows remote attackers to obtain a valid high privilege JWT token without prior authentication via sending an empty HTTP POST. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Vedo Suite
-
CVE-2025-51053
MEDIUM
CVSS 6.1
A Cross-site scripting (XSS) vulnerability in /api_vedo/ in Vedo Suite version 2024.17 allows remote attackers to inject arbitrary Javascript or HTML code and potentially trigger code execution in. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
RCE
XSS
Vedo Suite
-
CVE-2025-51052
MEDIUM
CVSS 6.5
A path traversal vulnerability in Vedo Suite 2024.17 allows remote authenticated attackers to read arbitrary filesystem files by exploiting an unsanitized 'file_get_contents()' function call in. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Path Traversal
Vedo Suite
-
CVE-2025-50740
MEDIUM
CVSS 6.1
AutoConnect 1.4.2, an Arduino library, is vulnerable to a cross site scripting (xss) vulnerability. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XSS
-
CVE-2025-50234
MEDIUM
CVSS 6.5
MCCMS v2.7.0 has an SSRF vulnerability located in the index() method of the sys\apps\controllers\api\Gf.php file, where the pic parameter is processed. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
RCE
Microsoft
SSRF
Privilege Escalation
-
CVE-2025-50233
MEDIUM
CVSS 6.5
A vulnerability in QCMS version 6.0.5 allows authenticated users to read arbitrary files from the server due to insufficient validation of the "Name" parameter in the backend template editor. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
Path Traversal
Qcms
-
CVE-2025-48394
MEDIUM
CVSS 4.7
An attacker with authenticated and privileged access could modify the contents of a non-sensitive file by traversing the path in the limited shell of the CLI. Rated medium severity (CVSS 4.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
-
CVE-2025-48393
MEDIUM
CVSS 5.7
The server identity check mechanism for firmware upgrade performed via command shell is insecurely implemented potentially allowing an attacker to perform a Man-in-the-middle attack. Rated medium severity (CVSS 5.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-46660
MEDIUM
CVSS 5.3
An issue was discovered in 4C Strategies Exonaut 21.6. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Exonaut
-
CVE-2025-46391
MEDIUM
CVSS 6.5
CWE-284: Improper Access Control. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-46389
MEDIUM
CVSS 6.5
CWE-620: Unverified Password Change. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-46388
MEDIUM
CVSS 4.3
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-36020
MEDIUM
CVSS 5.9
IBM Guardium Data Protection could allow a remote attacker to obtain sensitive information due to cleartext transmission of sensitive credential information. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
IBM
Information Disclosure
Guardium Data Protection
-
CVE-2025-32430
MEDIUM
CVSS 6.5
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
XSS
Xwiki
-
CVE-2025-27072
MEDIUM
CVSS 5.5
Information disclosure while processing a packet at EAVB BE side with invalid header length. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
-
CVE-2025-23335
MEDIUM
CVSS 4.4
NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability where an attacker could cause an underflow by a specific model configuration and a specific. Rated medium severity (CVSS 4.4), this vulnerability is remotely exploitable. No vendor patch available.
Denial Of Service
Nvidia
Microsoft
Integer Overflow
Triton Inference Server
-
CVE-2025-23334
MEDIUM
CVSS 5.9
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Nvidia
Buffer Overflow
Microsoft
Python
Information Disclosure
-
CVE-2025-23333
MEDIUM
CVSS 5.9
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by manipulating shared memory data. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Nvidia
Buffer Overflow
Microsoft
Python
Information Disclosure
-
CVE-2025-22469
MEDIUM
CVSS 6.9
OS command injection vulnerability exists in CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the firmware versions prior to 1.15.5-r1. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-21472
MEDIUM
CVSS 5.5
Information disclosure while capturing logs as eSE debug messages are logged. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Qca9367 Firmware
Qca9377 Firmware
-
CVE-2025-21465
MEDIUM
CVSS 6.5
Information disclosure while processing the hash segment in an MBN file. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
315 5g Iot Modem Firmware
9205 Lte Modem Firmware
Aqt1000 Firmware
-
CVE-2025-21464
MEDIUM
CVSS 6.5
Information disclosure while reading data from an image using specified offset and size parameters. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Qcm4490 Firmware
Qcm5430 Firmware
Qcm6125 Firmware
-
CVE-2025-21457
MEDIUM
CVSS 6.1
Information disclosure while opening a fastrpc session when domain is not sanitized. Rated medium severity (CVSS 6.1), this vulnerability is low attack complexity.
Buffer Overflow
Information Disclosure
Ar8035 Firmware
Fastconnect 7800 Firmware
Qca6584au Firmware
-
CVE-2025-21021
MEDIUM
CVSS 5.7
Out-of-bounds write in drawing pinpad in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory. Rated medium severity (CVSS 5.7). No vendor patch available.
Memory Corruption
Buffer Overflow
Blockchain Keystore
-
CVE-2025-21020
MEDIUM
CVSS 5.7
Out-of-bounds write in creating bitmap images in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory. Rated medium severity (CVSS 5.7). No vendor patch available.
Memory Corruption
Buffer Overflow
Blockchain Keystore
-
CVE-2025-21019
MEDIUM
CVSS 5.5
Improper authorization in Samsung Health prior to version 6.30.1.003 allows local attackers to access data in Samsung Health. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Samsung
Information Disclosure
Health
-
CVE-2025-21018
MEDIUM
CVSS 4.4
Out-of-bounds read in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to read out-of-bounds memory. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Information Disclosure
Blockchain Keystore
-
CVE-2025-21017
MEDIUM
CVSS 6.3
Out-of-bounds write in detaching crypto box in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory. Rated medium severity (CVSS 6.3), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Blockchain Keystore
-
CVE-2025-21016
MEDIUM
CVSS 4.3
Improper access control in PkgPredictorService prior to SMR Aug-2025 Release 1 in Chinese Android 13, 14, 15 and 16 allows local attackers to use the privileged APIs. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Google
Information Disclosure
Android
-
CVE-2025-21015
MEDIUM
CVSS 4.0
Path Traversal in Document scanner prior to SMR Aug-2025 Release 1 allows local attackers to delete file with Document scanner's privilege. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Path Traversal
Android
-
CVE-2025-21014
MEDIUM
CVSS 4.3
Improper export of android application component in Emergency SoS prior to SMR Aug-2025 Release 1 allows local attackers to access sensitive information. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Google
Information Disclosure
Android
-
CVE-2025-21013
MEDIUM
CVSS 6.2
Improper access control in SemSensorManager for Galaxy Watch prior to SMR Aug-2025 Release 1 allows local attackers to access sensitive information related to outdoor exercise and sleep time. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-21012
MEDIUM
CVSS 5.5
Improper access control in fall detection for Galaxy Watch prior to SMR Aug-2025 Release 1 allows local attackers to modify fall detection configuration. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-21011
MEDIUM
CVSS 5.5
Improper access control in SemSensorService for Galaxy Watch prior to SMR Aug-2025 Release 1 allows local attackers to access sensitive information related to motion and body sensors. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-21010
MEDIUM
CVSS 6.0
Improper privilege management in SamsungAccount prior to SMR Aug-2025 Release 1 allows local privileged attackers to deactivate Samsung account. Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. No vendor patch available.
Samsung
Information Disclosure
Android
-
CVE-2025-20990
MEDIUM
CVSS 4.0
Improper access control in accessing system device node prior to SMR Aug-2025 Release 1 allows local attackers to access device identifier. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Android
-
CVE-2025-20332
MEDIUM
CVSS 4.3
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Cisco
-
CVE-2025-20331
MEDIUM
CVSS 5.4
A vulnerability in the web-based management interface of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Cisco
XSS
-
CVE-2025-20215
MEDIUM
CVSS 5.4
A vulnerability in the meeting-join functionality of Cisco Webex Meetings could have allowed an unauthenticated, network-proximate attacker to complete a meeting-join process in place of an intended. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required. No vendor patch available.
Cisco
Information Disclosure
-
CVE-2025-8667
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, was found in SkyworkAI DeepResearchAgent up to 08eb7f8eb9505d0094d75bb97ff7dacc3fa3bbf2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
-
CVE-2025-8665
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, has been found in agno-agi agno up to 1.7.5.py of the component Model Context Protocol Handler. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
-
CVE-2025-8656
MEDIUM
CVSS 6.8
Kenwood DMX958XR Protection Mechanism Failure Software Downgrade Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
RCE
Dmx958Xr Firmware
-
CVE-2025-8655
MEDIUM
CVSS 6.8
Kenwood DMX958XR libSystemLib Command injection Remote Code Execution Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8652
MEDIUM
CVSS 6.8
Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8651
MEDIUM
CVSS 6.8
Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8650
MEDIUM
CVSS 6.8
Kenwood DMX958XR libSystemLib Command Injection Remote Code Execution Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8649
MEDIUM
CVSS 6.8
Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8648
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8647
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8646
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8645
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8644
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8643
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8642
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8641
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8640
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8639
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8638
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8637
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8636
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8635
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8634
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8633
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8632
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8631
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8630
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8629
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8628
MEDIUM
CVSS 6.8
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Dmx958Xr Firmware
-
CVE-2025-8620
MEDIUM
CVSS 5.3
The GiveWP - Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Exposure of Sensitive Information vulnerability could allow attackers to access sensitive data that should not be disclosed.
WordPress
Information Disclosure
-
CVE-2025-8616
MEDIUM
CVSS 6.1
A weakness identified in OpenText Advanced Authentication where a Malicious browser plugin can record and replay the user authentication process to bypass Authentication.5.0. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Authentication Bypass
-
CVE-2025-8595
MEDIUM
CVSS 4.3
The Zakra theme for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the welcome_notice_import_handler() function in all versions up to, and including,. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
WordPress
PHP
-
CVE-2025-8419
MEDIUM
CVSS 5.3
A vulnerability was found in Keycloak-services. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Code Injection
Keycloak
Redhat
-
CVE-2025-8100
MEDIUM
CVSS 5.4
The Element Pack Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_content' parameter in versions up to, and including, 8.1.5 due to. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.
WordPress
XSS
Element Pack
PHP
-
CVE-2025-7954
MEDIUM
CVSS 6.0
A race condition vulnerability has been identified in Shopware's voucher system of Shopware v6.6.10.4 that allows attackers to bypass intended voucher restrictions and exceed usage limitations. Rated medium severity (CVSS 6.0), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Race Condition
Shopware
-
CVE-2025-7727
MEDIUM
CVSS 6.4
The Gutenverse plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Animated Text and Fun Fact blocks in all versions up to, and including, 3.1.0 due to insufficient. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-7502
MEDIUM
CVSS 6.4
The WPBakery Page Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several shortcodes in all versions up to, and including, 8.5 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
Page Builder
PHP
-
CVE-2025-7498
MEDIUM
CVSS 6.4
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown Widget in all versions up to, and including, 2.7.9.4 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.
WordPress
XSS
Exclusive Addons For Elementor
PHP
-
CVE-2025-7399
MEDIUM
CVSS 6.4
The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via an Elementor display setting in all versions up to, and including, 28.1.3 due to insufficient input sanitization and. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-7376
MEDIUM
CVSS 5.9
Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS. Rated medium severity (CVSS 5.9), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Microsoft
-
CVE-2025-7202
MEDIUM
CVSS 5.1
A Cross-Site Request Forgery (CSRF) in Elgato's Key Lights and related light products allows an attacker to host a malicious webpage that remotely controlles the victim's lights. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
CSRF
-
CVE-2025-6986
MEDIUM
CVSS 6.5
The FileBird - WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in all versions up to, and including, 6.4.8 due to. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
SQLi
PHP
-
CVE-2025-6690
MEDIUM
CVSS 6.4
The WP Tournament Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘field’ parameter in all versions up to, and including, 1.3.0 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-6632
MEDIUM
CVSS 5.3
A maliciously crafted PSD file, when linked or imported into Autodesk 3ds Max, can force an Out-of-Bounds Read vulnerability. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
RCE
Information Disclosure
3ds Max
-
CVE-2025-6259
MEDIUM
CVSS 6.4
The esri-map-view plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's esri-map-view shortcode in all versions up to, and including, 1.2.3 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-6256
MEDIUM
CVSS 6.4
The Flex Guten plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘thumbnailHoverEffect’ parameter in all versions up to, and including, 1.2.5 due to insufficient input. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
-
CVE-2025-6013
MEDIUM
CVSS 6.5
Vault and Vault Enterprise’s (“Vault”) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Hashicorp
Information Disclosure
Vault
Redhat
Suse
-
CVE-2025-5197
MEDIUM
CVSS 5.3
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the Hugging Face Transformers library, specifically in the `convert_tf_weight_name_to_pt_weight_name()` function. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Denial Of Service
Transformers
Tensorflow
AI / ML
Pytorch
-
CVE-2025-2028
MEDIUM
CVSS 6.5
Lack of TLS validation when downloading a CSV file including mapping from IPs to countries used ONLY for displaying country flags in logs. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Log Server
-
CVE-2024-55402
MEDIUM
CVSS 5.3
4C Strategies Exonaut before v22.4 was discovered to contain an access control issue. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Exonaut
-
CVE-2024-55399
MEDIUM
CVSS 6.5
4C Strategies Exonaut before v21.6.2.1-1 was discovered to contain a Server-Side Request Forgery (SSRF). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SSRF
Exonaut
-
CVE-2024-55398
MEDIUM
CVSS 6.5
4C Strategies Exonaut before v22.4 was discovered to contain insecure permissions. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Privilege Escalation
Exonaut
-
CVE-2024-52885
MEDIUM
CVSS 5.0
The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
Mobile Access
Remote Access Vpn
-
CVE-2025-55027
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55026
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55025
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55024
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55023
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55022
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55021
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55020
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-55019
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-54873
LOW
CVSS 2.7
RISC Zero is a zero-knowledge verifiable general computing platform based on zk-STARKs and the RISC-V microarchitecture. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-45764
LOW
CVSS 3.2
jsrsasign v11.1.0 was discovered to contain weak encryption. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.
Information Disclosure
-
CVE-2025-38746
LOW
CVSS 3.5
Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Rated low severity (CVSS 3.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Dell
Information Disclosure
Supportassist Os Recovery
-
CVE-2025-21024
LOW
CVSS 3.3
Use of Implicit Intent for Sensitive Communication in Smart View prior to Android 16 allows local attackers to access sensitive information. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Google
Information Disclosure
Android
-
CVE-2025-21023
LOW
CVSS 3.3
Improper access control in WcsExtension for Galaxy Watch prior to Android Watch 16 allows local attackers to access sensitive information. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Google
Information Disclosure
Android
-
CVE-2025-21022
LOW
CVSS 3.3
Improper access control in Galaxy Wearable prior to version 2.2.63.25042861 allows local attackers to access sensitive information. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Galaxy Wearable
-
CVE-2025-8556
LOW
CVSS 3.7
A flaw was found in CIRCL's implementation of the FourQ elliptic curve. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Code Injection
-
CVE-2025-8130
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2025-8086
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2024-8244
LOW
CVSS 3.7
The filepath.Walk and filepath.WalkDir functions are documented as not following symbolic links, but both functions are susceptible to a TOCTOU (time of check/time of use) race condition where a. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure